Key predictions for 2025 part II: Preparing for the quantum leap
As 2025 unfolds, organizations must adapt to transformative shifts in technology, security, and compliance. Key trends include the decline of legacy technology stacks in preparation for post-quantum cryptography, the reduction of TLS certificate lifespans, and stricter revocation policies. These changes demand proactive strategies, automation, and modernization to maintain security and ... Read More
Key trends for 2025 Part I: Postquantum Cryptography
In 2025, postquantum cryptography (PQC) will drive major transformations in the PKI space, with announcements of PQC capabilities, adoption of quantum-safe Hardware Security Modules (HSMs), and standardized PQC algorithms in private PKI. Organizations must adapt early to safeguard sensitive data and stay ahead of emerging quantum threats ... Read More
The clock is ticking: NIST’s bold move towards Post-Quantum Cryptography
NIST is driving the global transition to post-quantum cryptography, setting a 2030 deadline to deprecate RSA-2048 and ECC-256 algorithms and banning them entirely by 2035. This shift addresses quantum computing's potential to compromise current encryption, emphasizing the need for quantum-resistant solutions to combat risks like "harvest now, decrypt later" attacks ... Read More
How businesses can prepare for the 47-day certificate lifecycle: What it means and recent updates
Apple’s proposal to shorten SSL/TLS certificate lifespans to 47 days by 2028 emphasizes enhanced security and automation. Shorter cycles reduce vulnerabilities, encourage automated certificate management, and push businesses to adopt efficient tools like ACME protocols. While the proposal isn’t yet mandatory, businesses must prepare by modernizing infrastructure, automating renewal processes, ... Read More
SSL certificate installation guide
SSL/TLS certificates secure digital communication through encryption and authentication, requiring a Certificate Authority (CA) for issuance. Installation involves uploading certificate files and configuring servers, with specific instructions for platforms like Zimbra, Nginx, Tomcat, and more. Prior steps include generating a CSR and choosing the right SSL type, while post-installation actions ... Read More
Apple Releases Draft Ballot to Shorten Certificate Lifespan to 45 Days
Earlier this week, on October 9, during the second day of the fall CA/Browser Forum Face-to-Face meeting, Apple revealed that it had published a draft ballot for commentary to GitHub. This proposal, which is sponsored by Sectigo, offers to incrementally phase maximum term for public SSL/TLS certificates down to 45 ... Read More
Multi-Domain vs Wildcard SSL Certificates: Differences & Uses
Digital certificates take many forms but they share the same primary goal: to authenticate a website or server's identity. How this is accomplished will depend on the type of certificate and the level of authentication or protection needed ... Read More
Entrust distrust: How to move to a new Certificate Authority
Entrust, a once-trusted Certificate Authority (CA), has faced a significant setback as Google and Mozilla have announced they will no longer trust Entrust's SSL/TLS certificates due to security concerns. This move leaves current Entrust customers scrambling to find alternative CAs to ensure secure digital connections. The article emphasizes the urgency ... Read More
S/MIME encryption: What it is and how does it work?
Malicious emails form the basis for some of today's most devastating cyberattacks. These attacks are dangerous, in part, due to the inherent simplicity and ubiquity of email. It's easy to see, then, why email often represents a major cybersecurity weak link, even among organizations that otherwise appear to maintain a ... Read More
How much does an SSL certificate cost? Considerations & purchasing process
SSL certificates are crucial for website security, encrypting communications between servers and browsers to ensure secure connections. The purchasing process involves selecting a Certificate Authority (CA), choosing the appropriate type of SSL certificate based on validation level (DV, OV, or EV) and coverage (single domain, multi-domain, or wildcard), and completing ... Read More